Receiving a ransom demand in cryptocurrencies such as bitcoin has become a frequent threat in today's digital landscape. Cybercriminals and scammers exploit vulnerabilities to hack into a computer, activate a webcam or steal a password, then demand a ransom. This type of scam is sometimes accompanied by a broader scam aimed at intimidating the victim by evoking a massive hack.
In most cases, it is not advisable to pay the ransom, as this does not guarantee an end to the threat and simply encourages attacks. On the contrary, it is preferable to receive practical advice and to report the incident quickly to avoid any repetition. When faced with these sophisticated methods, knowing how to react effectively can limit the damage and regain control of your data.

First step: analyse the threat and protect your accesses
Don't give in to pressure from cybercriminals
When a hacker threatens you with webcam blackmail, ransomware or an extortion message, the aim is to make you believe that they have succeeded in hacking into your files or accounts. These methods are often based on fraudulent scenarios, sometimes reinforced by phishing, to get the victim to give in. However, the rule is clear: never respond, never initiate a transaction in cryptocurrency or virtual currency, as this guarantees nothing and simply feeds this illegal market.
Check the facts and secure your data
First and foremost, it's vital to check whether your device has really been compromised or simply targeted by a malicious e-mail. In most cases, it's not a real hack, but a sender trying to scare you. To strengthen your security, start by changing your sensitive identifiers and keeping only secure versions of your data. If you identify that your files have been infected by ransomware, it is essential to lodge a complaint and contact the specialist authorities immediately. And don't forget to report any suspicious websites that promote these practices.
Second step: don't pay the ransom and do the right thing
Why you should never pay the ransom
Even if cybercriminals demand that you pay the ransom in cryptocurrencies, we strongly advise against giving in. Not only does a hacker or hackers offer no guarantee of decryption, but it also encourages further attacks with the same type of message. In cases of sextortion or intrusion by malicious software, the first reaction should be to assess what to do if you are a victim and, above all, what to do if your files are blocked.
Preserving and signposting Traces
It is crucial to preserve evidence: screenshots of the blackmail message, a backup of the suspect attachment or a record of the email addresses used. This information will be useful for the public prosecutor or specialist services. In many cases, simple phishing can resemble a sophisticated attack. The No More Ransom portal also offers free decryption tools for certain known ransomware, so you can avoid falling into the trap. Finally, be sure to compare the attack with your own address to distinguish genuine illegal access from an attempt at intimidation.
Before we get to the practical solutions, it's essential to keep a close eye on your email inbox, as this is often where cryptocurrency-related scams start.
Third step: protect your data and report the attack
Identifying and reacting to cybercriminals
If cybercriminals demand a ransom for your files or personal data, it's important not to give in. In many cases, hackers promise a decryption solution, but send nothing after payment. Paying only feeds the chain of scams and increases the risk of being targeted again.
Check for compromise and secure your access
If you receive a message saying that your mailbox or personal data have been hacked, start by changing your passwords immediately and activating double authentication. If you think you've been the victim of a scam, keep all the evidence: emails, screenshots, technical details. These items can be analysed by a cybersecurity expert to establish professional proof.

Report the incident to the authorities
An incident with the CNIL or data theft must be reported without delay. This enables appropriate advice to be obtained and the consequences of a leak to be limited. In addition, a compromised cryptocurrency wallet should be blocked immediately and transferred to another secure medium. Finally, if a technical solution or free decryption tool exists, it will be communicated by the authorities or specialist platforms.
Faced with scams It is essential to remain vigilant. Whether it's a hacker having accessed your mail box or a request for payment in cryptocurrencies, However, caution remains the best defence. Methods are evolving and are regularly updates, This requires constant monitoring and a good knowledge of the risks to avoid falling into the trap.
Conclusion
If someone demands payment and then asks you for a ransom, here's how to react: be on your guard, don't pay and keep all proof. Blackmail messages sometimes mention consulting a pornographic site or claim to have images, or even announce control of the computer. Protect all your equipment, change your access and never give out your own e-mail address. Report the case without delay - extortion is covered by article 312-1 of the Criminal Code and can cost several thousand euros, or even up to 100,000 euros depending on the seriousness of the offence.
Your security starts with your DNS configuration
Scan your DNS records to detect vulnerabilities and prevent malicious access:
👉 Analyse my DNS with our free scanner


